Anais Do XXI Simpósio Brasileiro De Segurança Da Informação E De Sistemas Computacionais (SBSeg 2021) 2021
DOI: 10.5753/sbseg.2021.17305
|View full text |Cite
|
Sign up to set email alerts
|

Zero Trust Access Control with Context-Aware and Behavior-Based Continuous Authentication for Smart Homes

Abstract: Generally, approaches to build the security of Smart Home Systems (SHS) require big amount of data to implement Access Control and Intrusion Detection Systems, with storage in cloud, for instance, being a vulnerability to inhabitants privacy. Besides, most works rely on cloud computing or resources in the cloud to perform security tasks, what can be exploited by attackers. This work presents the ZASH (Zero-Aware Smart Home System), an Access Control for SHS. ZASH uses Continuous Authentication with Zero Trust,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…In 2021, da Silva et al [39] proposed zero trust access control with context awareness and behavior-based continuous authentication for smart homes. A zero-aware smart home system is proposed to provide access control to the smart home system using zero trust continuous identity authentication to continuously verify the authenticity of the user, powered by edge computing to eliminate unreliable service providers and access from any means.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…In 2021, da Silva et al [39] proposed zero trust access control with context awareness and behavior-based continuous authentication for smart homes. A zero-aware smart home system is proposed to provide access control to the smart home system using zero trust continuous identity authentication to continuously verify the authenticity of the user, powered by edge computing to eliminate unreliable service providers and access from any means.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…Nonetheless, it does not support passive access control and role hierarchy. Silva et al [15] presented zero trust access control with context-aware and behavior-based continuous authentication. However, the impact of latency and concurrency remains untested, and the accuracy cannot be guaranteed.…”
Section: Introductionmentioning
confidence: 99%